Security in computing / Charles P. Pfleeger.
Material type: TextPublication details: Upper Saddle River, NJ : Prentice Hall PTR, c2003.Edition: 3rd edDescription: xvii,746 p. : ill. ; 24 cmISBN:- 0131201999
- 9780131201996
- 005.8 20
- QA76.9.A25 P45 2003
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - TRC General Stacks | Non-fiction | QA76.9. A25 P45 2003 (Browse shelf(Opens below)) | Available | Z005412 | |||
Books | Zetech Library - TRC General Stacks | Non-fiction | QA76.9. A25 P45 2003 (Browse shelf(Opens below)) | C.1 | Available | Z006537 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | QA76.9. A25 P45 2003 (Browse shelf(Opens below)) | C.1 | Checked out | 03/10/2024 | Z006461 |
Browsing Zetech Library - TRC shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA76.9. A25 P45 1997 Security in computing / | QA76.9. A25 P45 2003 Security in computing / | QA76.9. A25 P45 2003 Security in computing / | QA76.9. A25 P45 2003 Security in computing / | QA76.9.A25P57 2000 Information security : protecting the global enterprise / | QA76.9.A25P57 2000 Information security : protecting the global enterprise / | QA76.9.A25P57 2000 Information security : protecting the global enterprise / |
Includes bibliographical references (p. 537-559) and index.
Is there a security problem in computing? -- Elementary cryptography -- Program security -- Protection in general-purpose operating systems -- Designing trusted operating systems -- Database security -- Security in networks -- Administering security -- Legal,privacy, and ethical issues in computer security -- Cryptography explained.
There are no comments on this title.